HTB Validation writeup

In this tutorial we will get root access for the Validation machine from Hack The Box.

Read more…

Web penetration testing

In this tutorial we’re going to define base steps for web penetration testing and find vulnerabilities in DVWA.

Read more…

Network penetration testing

In this tutorial we’re going to identify running services on the target server and try to exploit them.

Read more…

Passive information gathering

The 1st step of any penetration test is gathering information about the target company. In this tutorial we will go through all the steps required for passive information gathering.

Read more…

Android reverse engineering

Hello everybody. In this tutorial we’re going to reverse engineer a vulnerable android app, find all vulnerabilities and create a report. 

Read more…

Your first Ethereum smart contract

In this tutorial we are going to write a smart contact in Solidity language that can prove file ownership.

Read more…

Comprehensive guide to Redis. Part 6.

In this tutorial, we are going to vet some common pitfalls when using Redis.

Read more…

Converting pdf file to html canvas with text selection using PDF.js

In this tutorial, we are going to display a pdf file inside an html canvas object with the ability to select the text in the page.

Read more…

Comprehensive guide to Redis. Part 5.

In this tutorial, we are going to try out a Redis client library for PHP. Unlike the Node.js client we used in the previous tutorials, the chosen PHP client library is synchronous and do not require a callback function.

Read more…

Comprehensive guide to Redis. Part 4.

In this tutorial, we are going to overview other Redis commands and features.

Read more…